-
1
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport, Password Authentication with Insecure Communication, Communications of the ACM, 24(11): 770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
6
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, USA, August
-
S. Marti, T. J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, In Proc. 6th annual international conference on Mobile computing and networking (MOBICOM '00), Boston, Massachusetts, USA, August 2000.
-
(2000)
Proc. 6th annual international conference on Mobile computing and networking (MOBICOM '00)
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
8
-
-
85084161952
-
PGP in constrained wireless devices
-
Denver, Colorado, August
-
M. Brown, D. Cheung, D. Hankerson, J. Hernandez, M. Kirkup, and A. Menezes, PGP in constrained wireless devices, In Proc. 9th USENIX Security Symposium, Denver, Colorado, August 2000.
-
(2000)
Proc. 9th USENIX Security Symposium
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.4
Kirkup, M.5
Menezes, A.6
-
9
-
-
0004118144
-
-
Swiss Federal Institution of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, January 2001
-
L. Buttyan and J. P. Hubaux, Nuglets: A Virtual Currency to Stimulate Cooperation in Self-organized Mobile Ad Hoc Networks, Swiss Federal Institution of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, January 2001.
-
Nuglets: A Virtual Currency to Stimulate Cooperation in Self-organized Mobile Ad Hoc Networks
-
-
Buttyan, L.1
Hubaux, J.P.2
-
11
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, September
-
Y. C. Hu, A. Perrig and D. B. Johnson, Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks, In Proc. 8th ACM International Conference on Mobile Computing and Networking, Westin Peachtree Plaza, Atlanta, Georgia, USA, September 2002.
-
(2002)
Proc. 8th ACM International Conference on Mobile Computing and Networking, Westin Peachtree Plaza
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
October
-
H. Deng, W. Li and D. P. Agrawal, Routing security in wireless ad hoc networks, IEEE Commun. Mag., 40(10): 70-75, October 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
13
-
-
51849165425
-
Detecting black-hole attack in mobile ad hoc networks
-
Glasgow, UK, April
-
B. Sun, Y. Guan, J. Chen and U. W. Pooch, Detecting black-hole attack in mobile ad hoc networks, In Proc. 5th European Personal Mobile Communications Conference, Glasgow, UK, April 2003.
-
(2003)
Proc. 5th European Personal Mobile Communications Conference
-
-
Sun, B.1
Guan, Y.2
Chen, J.3
Pooch, U.W.4
-
17
-
-
84944714533
-
Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
-
Boston, Massachusetts, USA, August
-
A. Patcha and A. Mishra, Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, In Proc. Radio and Wireless Conference (RAWCON '03), Boston, Massachusetts, USA, August 2003.
-
(2003)
Proc. Radio and Wireless Conference (RAWCON '03)
-
-
Patcha, A.1
Mishra, A.2
-
18
-
-
84943576414
-
Friends and foes: Preventing selfishness in open mobile ad hoc networks
-
Providence, RI, USA, May
-
H. Miranda and L. Rodrigues, Friends and Foes: Preventing Selfishness in Open Mobile Ad hoc networks, In Proc. 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW'03), Providence, RI, USA, May 2003.
-
(2003)
Proc. 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW'03)
-
-
Miranda, H.1
Rodrigues, L.2
-
19
-
-
77953095994
-
Black hole attack in mobile ad hoc networks
-
Huntsville, ALabama, USA, April
-
M. Al-Shurman, S. M. Yoo and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, In Proc. 42nd Annual Southeast Regional Conference (ACMSE'04), Huntsville, ALabama, USA, April 2004.
-
(2004)
Proc. 42nd Annual Southeast Regional Conference (ACMSE'04)
-
-
Al-Shurman, M.1
Yoo, S.M.2
Park, S.3
-
20
-
-
35148829726
-
Components for cooperative intrusion detection in dynamic coalition environments
-
Toulouse, France, April
-
M. Jahnke, J. Tolle, M. Bussmann, and S. Henkel, Components for Cooperative Intrusion Detection in Dynamic Coalition Environments, In Proc. NATO/RTO IST Symposium on Adaptive defense in Unclassified Networks, Toulouse, France, April 2004.
-
(2004)
Proc. NATO/RTO IST Symposium on Adaptive defense in Unclassified Networks
-
-
Jahnke, M.1
Tolle, J.2
Bussmann, M.3
Henkel, S.4
-
21
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May
-
Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, 2(3): 28-39, May 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
23
-
-
25844465866
-
HADOF: Defense against routing disruptions in mobile ad hoc networks
-
Miami, USA, March
-
W. Yu, Y. Sun and K. R. Liu, HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks, In Proc. 24th IEEE INFOCOM, Miami, USA, March 2005.
-
(2005)
Proc. 24th IEEE INFOCOM
-
-
Yu, W.1
Sun, Y.2
Liu, K.R.3
-
24
-
-
24944489746
-
Non cooperative forwarding in ad hoc networks
-
Waterloo, Canada, May
-
E. Altman, A. Kherani, P. Michiardi and R. Molva, Non cooperative forwarding in ad hoc networks, In Proc. of the 4th IFIP International Conferences on Networking, Waterloo, Canada, May 2005.
-
(2005)
Proc. of the 4th IFIP International Conferences on Networking
-
-
Altman, E.1
Kherani, A.2
Michiardi, P.3
Molva, R.4
-
25
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
March
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, Authenticated routing for ad hoc networks, IEEE J. Sel. Areas Commun., 23(3): 598-610, March 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.4
Shields, C.5
Belding-Royer, E.6
-
26
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Fourth Quarter
-
D. Djenouri, L. Khelladi and N. Badache, A survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Commun. Surveys & Tutorials, 7(4): 2-28, Fourth Quarter 2005.
-
(2005)
IEEE Commun. Surveys & Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
28
-
-
27844590384
-
A survey on wireless mesh networks
-
September
-
I. F. Akyildiz and X. Wang, A Survey on Wireless Mesh Networks, IEEE Commun. Mag., 43(9), S23-S30, September 2005.
-
(2005)
IEEE Commun. Mag.
, vol.43
, Issue.9
-
-
Akyildiz, I.F.1
Wang, X.2
-
29
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
Third Quarter
-
P. Argyroudis and D. O'Mahony, Secure Routing for Mobile Ad Hoc Networks, IEEE Commun. Surveys & Tutorials, 7(3): 2-21, Third Quarter 2005.
-
(2005)
IEEE Commun. Surveys & Tutorials
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.1
O'Mahony, D.2
-
30
-
-
33744828999
-
Feedbacks for selfish nodes detection in mobile ad hoc networks
-
Barcelona, Spain, October
-
D. Djenouri, N. Ouali, A. Mahmoudi, and N. Badache, Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks, In Proc. 5th IEEE International Workshop on IP Operations and Management (IPOM'05), Barcelona, Spain, October 2005
-
(2005)
Proc. 5th IEEE International Workshop on IP Operations and Management (IPOM'05)
-
-
Djenouri, D.1
Ouali, N.2
Mahmoudi, A.3
Badache Random, N.4
-
31
-
-
42749100743
-
Fellowship: Defense against flooding and packet drop attacks in MANET
-
Vancouver, Canada, April
-
V. Balakrishnan, V. Varadharajan and U. K. Tupakula, Fellowship: Defense against Flooding and Packet Drop Attacks in MANET, In Proc. 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006), Vancouver, Canada, April 2006.
-
(2006)
Proc. 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006)
-
-
Balakrishnan, V.1
Varadharajan, V.2
Tupakula, U.K.3
-
32
-
-
33845927390
-
Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing
-
United States Military Academy, West Point, NY, 21-23 June
-
S. S. Ramaswami and S. Upadhyaya, Smart handling of Colluding black Hole attacks in MANETs and Wireless Sensor Networks using Multipath Routing, In Proc. Workshop on Information Assurance, United States Military Academy, West Point, NY, 21-23 June 2006.
-
(2006)
Proc. Workshop on Information Assurance
-
-
Ramaswami, S.S.1
Upadhyaya, S.2
-
33
-
-
33751209191
-
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
-
February
-
Y. R. Tsai and S. J. Wang, Two-tier authentication for cluster and individual sets in mobile ad hoc networks, Computer Networks, 51(3): 883-900, February 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 883-900
-
-
Tsai, Y.R.1
Wang, S.J.2
-
34
-
-
44049094385
-
Cooperation enforcement in autonomous MANETs under noise and imperfect observation
-
September
-
Z. Ji,W. Yu and K. J. Ray Liu, Cooperation Enforcement in Autonomous MANETs under Noise and Imperfect Observation, In Proc. 3rd Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON), Reston, VA, USA, September, 2006.
-
(2006)
Proc. 3rd Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON), Reston, VA, USA
-
-
Ji, Z.1
Yu, W.2
Ray Liu, K.J.3
-
35
-
-
35148831132
-
Impact of sanitized message flows in a cooperative intrusion warning system
-
Washington, DC, October
-
Tolle, M. Jahnke, N. gentschen Felde, and P. Martini, Impact of Sanitized Message Flows in a Cooperative Intrusion Warning System, In Proc. 25th Military Communications Conference (MILCOM 2006), Washington, DC, October 2006.
-
(2006)
Proc. 25th Military Communications Conference (MILCOM 2006)
-
-
Jahnke, T.M.1
Gentschen Felde, N.2
Martini, P.3
-
36
-
-
50949098419
-
A collusion attack against olsr-based mobile ad hoc networks
-
San Francisco, California, USA, Nov/Dec
-
B. Kannhavong, H. Nakamaya and A. Jamalipour, A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks, In Proc. Global Communications Conference (GLOBECOM '06), San Francisco, California, USA, Nov/Dec 2006.
-
(2006)
Proc. Global Communications Conference (GLOBECOM '06)
-
-
Kannhavong, B.1
Nakamaya, H.2
Jamalipour, A.3
-
37
-
-
33845666617
-
Inner-circle consistency for wireless ad hoc networks
-
January
-
C. Basile, Z. Kalbarczyk and R. K. lyer, Inner-Circle Consistency for Wireless Ad Hoc Networks, IEEE Trans. Mobile Comput., 6(1): 39-55, January 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.1
, pp. 39-55
-
-
Basile, C.1
Kalbarczyk, Z.2
Lyer, R.K.3
-
38
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. liu, J. Deng, P. K. Varshney and K. Balakrishnan, An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs, IEEE Trans. Mobile Comput., 6(5): 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
39
-
-
38549088052
-
Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
-
Glasgow, June
-
N. Nasser and Y. Chen, Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks, In Proc. Internationl Conference on Communication (ICC 07), Glasgow, June 2007.
-
(2007)
Proc. Internationl Conference on Communication (ICC 07)
-
-
Nasser, N.1
Chen, Y.2
-
40
-
-
46749091715
-
On detecting packets droppers in MANET: A novel low cost approach
-
Manchester, UK, August
-
T. Fahad, D. Djenouri and R. Askwith. On detecting Packets Droppers in MANET: A Novel Low Cost Approach, In Proc. 3rd International Symposium on Information Assurance and Security, Manchester, UK, August 2007.
-
(2007)
Proc. 3rd International Symposium on Information Assurance and Security
-
-
Fahad, T.1
Djenouri, D.2
Askwith, R.3
-
42
-
-
54249101364
-
Surveying security analysis techniques in MANET routing protocols
-
Fourth Quarter
-
T. R. Andel and A. Yasinsac, Surveying Security Analysis Techniques in MANET Routing Protocols, IEEE Commun. Surveys & Tutorials, 9(4): 70-84, Fourth Quarter 2007.
-
(2007)
IEEE Commun. Surveys & Tutorials
, vol.9
, Issue.4
, pp. 70-84
-
-
Andel, T.R.1
Yasinsac, A.2
-
43
-
-
47249164736
-
Detecting black hole attacks in tactical MANETs using topology graphs
-
Dublin, Ireland, October
-
E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke and J. Tolle. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs, In Proc. of the 33rd IEEE Conference on Local Computer Networks (LCN), Dublin, Ireland, October 2007.
-
(2007)
Proc. of the 33rd IEEE Conference on Local Computer Networks (LCN)
-
-
Gerhards-Padilla, E.1
Aschenbruck, N.2
Martini, P.3
Jahnke, M.4
Tolle, J.5
-
44
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
October
-
Y. Zhang, W. Lou, W. Liu and Y. Fang, A secure incentive protocol for mobile ad hoc networks, Wireless Networks journal, 13(5): 569-582, October 2007.
-
(2007)
Wireless Networks journal
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
45
-
-
34548048170
-
Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method
-
November
-
S. Kurosawa, H. Nakayama, N. Kato, A. jamalipour and Y. Nemoto, Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method, International Journal of Network Security, 5(3): 338-346, November 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 338-346
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Jamalipour, A.4
Nemoto, Y.5
-
46
-
-
58049135707
-
Cooperative black and gray hole attacks in mobile ad hoc networks
-
SKKU, Suwon, Korea, Jan/Feb
-
P. Agrawal, R. K. Ghosh and S. K. Das, Cooperative black and gray hole attacks in mobile ad hoc networks, In Proc. of the 2nd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), SKKU, Suwon, Korea, Jan/Feb 2008.
-
(2008)
Proc. of the 2nd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008)
-
-
Agrawal, P.1
Ghosh, R.K.2
Das, S.K.3
-
48
-
-
51649124043
-
RADAR: A reputation-based scheme for detecting anomalous nodes in wireless mesh networks
-
Las Vegas, USA, March
-
Z. H. Zhang, F. Naït-abdesselam, P. H. Ho and X. Lin, RADAR: A ReputAtion-based scheme for Detecting Anomalous nodes in wiReless mesh networks, In Proc. IEEE Wireless Communications and Networking Conference (WCNC2008), Las Vegas, USA, March 2008.
-
(2008)
Proc. IEEE Wireless Communications and Networking Conference (WCNC2008)
-
-
Zhang, Z.H.1
Naït-abdesselam, F.2
Ho, P.H.3
Lin, X.4
-
49
-
-
51249105950
-
SA-OLSR: Security aware optimized link state routing for mobile ad hoc networks
-
Beijing, China, May
-
B. Kannhavong, H. Nakamaya, Y. Nemoto, N. Kato and A. Jamalipour, SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks, In Proc. International Conference of Communication (ICC 2008), beijing, China, May 2008.
-
(2008)
Proc. International Conference of Communication (ICC 2008)
-
-
Kannhavong, B.1
Nakamaya, H.2
Nemoto, Y.3
Kato, N.4
Jamalipour, A.5
-
50
-
-
51249101665
-
An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol
-
Beijing, China, May 2008
-
S. Djahel, F. Naït-Abdesselam and A. Khokhar, An Acknowledgment-Based Scheme to Defend against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol, In Proc. of the International Conference on Communication (ICC 2008), beijing, China, May 2008.
-
Proc. of the International Conference on Communication (ICC 2008)
-
-
Djahel, S.1
Naït-Abdesselam, F.2
Khokhar, A.3
-
51
-
-
67249111760
-
AWF-NA: A complete solution for tampered packet detection in VANETs
-
New Orleans, LA, USA, NOV/DEC
-
Z. Li, C. Chigan and D. Wong, AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs, In Proc. Global Communications Conference (IEEE GLOBECOM 08), New Orleans, LA, USA, NOV/DEC 2008.
-
(2008)
Proc. Global Communications Conference (IEEE GLOBECOM 08)
-
-
Li, Z.1
Chigan, C.2
Wong, D.3
|